Skip the navigation

Cryptography For the Masses

By Gary Anthes
May 27, 2002 12:00 PM ET

Computerworld - Cryptography expert Martin Hellman, co-inventor of Diffie- Hellman public-key encryption, says he never encrypts his e-mail. It's just too much trouble.


"There's a lack of integrated, automatic, transparent crypto," says Hellman, professor emeritus of electrical engineering at Stanford University. "If security is an add-on that people have to do something special to get, then most of the time they will not get it."


But there are developments afoot that during the next five years may bring some of the integration, automation and transparency Hellman is looking for.


"Cryptographic operations will disappear into the infrastructure," predicts Tom Berson, a principal scientist at Palo Alto Research Center Inc. (PARC) in California. "The complexities of cryptography and of cryptographic key management will be hidden from users."


Encryption will be seamlessly integrated into virtually every computing device and piece of communications software, Berson says.


And it will happen not a moment too soon. Increased connectivity in general and the rapid rise in wireless communications in particular are leaving users with files, messages and telephone conversations vulnerable to loss of privacy and confidentiality.


PARC researchers have several projects under way to encourage the use of encryption. One, called Quicksilver, is a program aimed at convincing vendors and users that cryptography is no longer slow and difficult to use. In its Quicksilver Manifesto, PARC exhorts users to "demand that your interests take priority over obsolete beliefs about what can and cannot be done to secure your information."


PARC is also working on making encryption more user-friendly. For example, it has proposed an intuitive scheme for user authentication in ad hoc wireless networks. The scheme uses public-key cryptography, but without a public-key infrastructure (PKI) that requires users to have digital certificates signed by a trusted third party.


"The problem with PKI is the I, not the PK," says PARC researcher Diana Smetters.


Stanford researcher Dan Boneh is developing a public-key system based on Identity-Based Encryption, by which users can use their e-mail addresses as their public keys. Recipients of e-mail encrypted by the system wouldn't need pre-established keys or certificates. The system would also allow the creation of messages that can be read only at a specified future time.


And Anna Lysyanskaya, a computer science graduate student at MIT, is working with IBM to develop privacy-oriented "anonymous credentials." For example, users could sign up for an online service without divulging their identities. The service provider could verify that a user is registered, but it couldn't track his activities and track them back to him.


Years of Development


Encryption is based on complex mathematics, and it often takes years for experts to satisfy themselves that there are no serious flaws in a cryptosystem. For example, the new federal Advanced Encryption Standard (AES) algorithm, which is replacing the old, less secure Data Encryption Standard, is based on techniques developed in the mid-1990s. But the U.S. Department of Defense won't widely deploy AES cryptography until 2007.



Our Commenting Policies
Internet of Things: Get the latest!
Internet of Things

Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!